answered graded A+
Researchers are developing a smart dust sensor called _____ designed to be so small that it
floats in the air - correct answer ✔✔Smart dust
A field whose values uniquely identifies each record in a table is called - correct answer
✔✔Primary key
Using available technology to work from home or an off-site location is called ____ - correct
answer ✔✔Telecommuting
An _____ acts or behaves like a human expert in a field or area - correct answer ✔✔Expert
system
Structured Query Language is the name of an - correct answer ✔✔Language used for
information retrieval in relational databases
_____ hardware is hardware that can change its architecture and behavior dynamically by
autonomously interacting with its environment - correct answer ✔✔Evolvable
The 2003 CAN-SPAM Act gives law enforcement the right to impose penalties on people using
the Internet to distribute spam (TRUE OR FALSE) - correct answer ✔✔True
_____ specialist analyzes a computer system's vulnerability to threats from worms, viruses,
unauthorized access, and physical damage - correct answer ✔✔Security
, What is the biggest difference between HTML and XHTML - correct answer ✔✔XHTML
documents must be well formed
The _____ enables a program to perform one or more actions repeatedly as a loop as long as a
certain condition is met - correct answer ✔✔Repetition control structure
Strict DTD does NOT allow the use of deprecated elements (TRUE OR FALSE) - correct answer
✔✔True
An unsolicited email message encouraging you to participate in a contest for a world cruise is an
example of - correct answer ✔✔Spam
The act of attempting to fraudulently acquire information by distribution of email messages
asking prospective victims to verify their account of confirm billing information is referred to as
_____ - correct answer ✔✔Phishing
To create separate paragraph, the content for each paragraph must exist within its own _____ -
correct answer ✔✔<p> ... </p>
Using someone else's identity to purchase goods or services or perform other transactions is
called identity theft (TRUE OR FALSE) - correct answer ✔✔True
The _____ Act regulates how websites can collect information from minors and communicate
with them - correct answer ✔✔Children's Online Privacy Protection
A grocery store wants to identify the buying patterns of customers so it can maximize the
effectiveness of its direct marketing campaign. What would be the most helpful - correct answer
✔✔Data warehouse